Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain

Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital around us emits, radiates or receives radio waves. These include our cellphones, computers, automobiles, remote controls, key fobs, GPS, and this list could go on and on. This is a little understood field of cybersecurity by […]

Continue Reading

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems

Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege’s of the compromised user. Regular users on systems usually have very limited privileges and can not access many of the resources or make changes to their systems and resources (databases, etc.). This is one of the many ways […]

Continue Reading